CVE-2012-5975

The SSH USERAUTH CHANGE REQUEST feature in SSH Tectia Server 6.0.4 through 6.0.20, 6.1.0 through 6.1.12, 6.2.0 through 6.2.5, and 6.3.0 through 6.3.2 on UNIX and Linux, when old-style password authentication is enabled, allows remote attackers to bypass authentication via a crafted session involving entry of blank passwords, as demonstrated by a root login session from a modified OpenSSH client with an added input_userauth_passwd_changereq call in sshconnect2.c.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:C/I:C/A:C
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 95%
VendorProductVersion
sshtectia_server
6.0.4
sshtectia_server
6.0.5
sshtectia_server
6.0.6
sshtectia_server
6.0.7
sshtectia_server
6.0.8
sshtectia_server
6.0.9
sshtectia_server
6.0.10
sshtectia_server
6.0.11
sshtectia_server
6.0.12
sshtectia_server
6.0.13
sshtectia_server
6.0.14
sshtectia_server
6.0.17
sshtectia_server
6.0.18
sshtectia_server
6.0.19
sshtectia_server
6.0.20.
sshtectia_server
6.1.0
sshtectia_server
6.1.1
sshtectia_server
6.1.2
sshtectia_server
6.1.3
sshtectia_server
6.1.4
sshtectia_server
6.1.5
sshtectia_server
6.1.6
sshtectia_server
6.1.7
sshtectia_server
6.1.8
sshtectia_server
6.1.9
sshtectia_server
6.1.12
sshtectia_server
6.2.0
sshtectia_server
6.2.1
sshtectia_server
6.2.2
sshtectia_server
6.2.3
sshtectia_server
6.2.4
sshtectia_server
6.2.5
sshtectia_server
6.3.0
sshtectia_server
6.3.1
sshtectia_server
6.3.2
𝑥
= Vulnerable software versions